Nmap Basic Commands





 

Nmap (Network Mapper) is a powerful and versatile open-source network scanning tool that is widely used for reconnaissance, security auditing, and network exploration. It allows you to discover hosts, identify open ports, and gather information about services running on those ports. Here are some commonly used commands and their examples in Nmap:

  1. Basic Scan: Command: nmap <target> Example: nmap 192.168.0.1 

    This command performs a basic scan on the target IP address (in this case, 192.168.0.1) to identify open ports and running services.

  2. Port Scan: Command: nmap -p <port> <target> Example: nmap -p 80 192.168.0.1 

    This command scans a specific port (in this case, port 80) on the target IP address to determine if it is open or closed.

  3. Scan Multiple Ports: Command: nmap -p <port1,port2,port3> <target> Example: nmap -p 80,443,8080 192.168.0.1 

    This command scans multiple ports (in this case, port 80, 443, and 8080) on the target IP address.

  4. Service Version Detection: Command: nmap -sV <target> Example: nmap -sV 192.168.0.1

  5. This command not only scans for open ports but also attempts to determine the version and details of the services running on those ports.

  6. Operating System Detection: Command: nmap -O <target> Example: nmap -O 192.168.0.1

  7. This command tries to identify the operating system of the target by analyzing network responses and characteristics.

  8. Aggressive Scan: Command: nmap -A <target> Example: nmap -A 192.168.0.1 

     This command enables aggressive scanning techniques, including service version detection, OS detection, script scanning, and traceroute.

  9. Script Scanning: Command: nmap -sC <target> Example: nmap -sC 192.168.0.1 

     This command runs default scripts against discovered services to gather additional information and potentially detect vulnerabilities.

These are just a few examples of Nmap commands and their usage. Nmap provides many more options and functionalities that can be explored in its documentation. It's important to use Nmap responsibly and ensure you have proper authorization before scanning any network or system.

Follow me on Instagram :  https://www.instagram.com/mr_white_hat._/

Comments